Your search returned 51 results. Subscribe to this search

|
1. Security in Computing

by PFLEEGER, CHARLES P | PFLEEGER, SHARI LAWRENCE.

Edition: 3rd. . Ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Prentice' Hall of India 2003Availability: Items available for loan: [Call number: 005.8 PFL] (3).

2. Network and Internetwork security

by STALLINGS, WILLIAM.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: NEW DELHI PHI LEARNING 1995Availability: Items available for loan: [Call number: 005.8 STA] (2).

3. Fundamentals of Computer Security

by PIEPRZYK, JOSEF | SEBERRY, JENNIFER | HARDIONO, THOMAS.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Springer 2003Availability: Items available for loan: [Call number: 005.8 PIE] (5).

4. Fundamentals of computer security

by PIEPRZYK, JOSEF | SEBERRY, JENNIFER | HARDIE, GLENN M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Springer 2003Availability: Items available for loan: [Call number: 005.8 PIE] (2).

5. An Ethical Guide to Corporate Security

by FADIA, ANKIT.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: delhi Macmillan 2004Availability: Items available for loan: [Call number: 658 FAD,C-2] (3).

6. Elements of Computer Security Undergraduate Topics in Computer Science

by SALOMON, DAVID.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: LONDON Springer 2010Availability: Items available for loan: [Call number: 005.8 SAL] (1).

7. Network Security A Decision and Game-Theoretic Approach

by ALPCAN, TANSU | BASAR, TAMER.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi CAMBRIDGE UNIVERSITY PRESS 2011Availability: Items available for loan: [Call number: 005.78 ALP] (1).

8. Elementary Information Security

by SMITH, RICHARD E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi JONES & BARTLETT LEARNING 2012Availability: Items available for loan: [Call number: 005.8 SMI, C-1] (2).

9. Hacking Exposed 6 Network Secirity Secrets & Solutions

by MC CLURE, STUART | KURTZ, GEORGE | SCAMBRAY, JOEL.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Tata McGraw-Hill 2009Availability: Items available for loan: [Call number: 005.8 MCC, C-1] (2).

10. Computer Security

by BISHOP, MATT.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Pearson Education 2003Availability: No items available Checked out (1).

11. Firewalls and Internet Security

by CHESWICK, WILLIAM R | RUBIN, AVIEL D | BELLOVIN, STEVEN M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Pearson Education 2003Availability: Items available for loan: [Call number: 005.8 CHE] (2).

12. Security in Computing

by PFLEEGER, CHARLES P | PFLEEGER, SHARI LAWRENCE.

Edition: 4 Ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: NEW DELHI PHI LEARNING 2007Availability: Items available for loan: [Call number: 005.8 PFL] (1).

13. Phishing and Countermeasures edited by JAKOBSSON, MARKUS ; MYERS, STEVEN

by JAKOBSSON, MARKUS ; MYERS, STEVEN.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Wiley-interscience 2007Availability: Items available for loan: [Call number: 005.8 JAK] (1).

14. Protection and Security on the Information Superhighway

by COHEN, FREDERICK B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York John Wiley & Sons 1995Availability: Items available for loan: [Call number: 005.8 COH] (1).

15. 1995 IEEE Symposium on Security and Privacy

by The Institute of Electrical and Electronics Engineers.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New york IEEE Press 1995Availability: Items available for loan: [Call number: 005.8 IEE] (1).

16. Internet Forensics

by JONES, ROBERT.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: MUMBAI SHROFF PUBLISHERS & DISTRIBUTORS 2006Availability: Items available for loan: [Call number: 005.8 JON] (1).

17. Information Hiding

by JOHNSON, NEIL F | JAJODIA, SUSHIL | DURIC, ZORAN.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Kluwer Academic 2001Availability: Items available for loan: [Call number: 005.8 JOH] (1).

18. Unix System Security

by FARROW, RIK.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Addison-Wesley 1991Availability: Items available for loan: [Call number: 005.8 FAR] (2).

19. The Eighth IEEE Computer Security Foundations Workshop

by IEEE COMPUTER SOCIETY TECHNICAL COMMITEE ON SECURITY AND PRIVACY.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New york IEEE Press 1995Availability: Items available for loan: [Call number: 005.8 IEEE] (1).

20. Digital Watermaking and Steganography

by COX, INGEMAR J | BLOOM, JEFFREY A | MILLER, MATTHEW L.

Edition: 2 Ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amestordom Elsevier 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).